MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

Dynamic probabilistic risk assessment for electric grid cybersecurity

X Diao, Y Zhao, C Smidts, PK Vaddi, R Li, H Lei… - Reliability Engineering & …, 2024 - Elsevier
Electric grid cybersecurity risk has become a significant concern of industries and
governments. This paper proposes a dynamic probabilistic risk assessment method for …

[HTML][HTML] “Talking a different Language”: Anticipating adversary attack cost for cyber risk assessment

R Derbyshire, B Green, D Hutchison - Computers & Security, 2021 - Elsevier
Typical cyber security risk assessment methods focus on the system under consideration, its
vulnerabilities, and the resulting impact in the event of a system compromise. Cyber security …

Automated generation of attack graphs using NVD

MU Aksu, K Bicakci, MH Dilek, AM Ozbayoglu… - Proceedings of the …, 2018 - dl.acm.org
Today's computer networks are prone to sophisticated multi-step, multi-host attacks.
Common approaches of identifying vulnerabilities and analyzing the security of such …

Predicting CVSS metric via description interpretation

JC Costa, T Roxo, JBF Sequeiros, H Proenca… - IEEE …, 2022 - ieeexplore.ieee.org
Cybercrime affects companies worldwide, costing millions of dollars annually. The constant
increase of threats and vulnerabilities raises the need to handle vulnerabilities in a …

GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security

J Brown, T Saha, NK Jha - IEEE Transactions on Emerging …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …

Vercasm-cps: Vulnerability analysis and cyber risk assessment for cyber-physical systems

B Northern, T Burks, M Hatcher, M Rogers… - Information, 2021 - mdpi.com
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential
to protect their assets from cyber attacks to increase the level of security, safety and …

Information security risk assessment using situational awareness frameworks and application tools

NA Chandra, K Ramli, AAP Ratna, TS Gunawan - Risks, 2022 - mdpi.com
This paper describes the development of situational awareness models and applications to
assess cybersecurity risks based on Annex ISO 27001: 2013. The risk assessment method …

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

M Dekker, L Alevizos - Security and Privacy, 2024 - Wiley Online Library
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …

A Methodological Framework for AI-Assisted Security Assessments of Active Directory Environments

G Nebbione, MC Calzarossa - Ieee Access, 2023 - ieeexplore.ieee.org
The pervasiveness of complex technological infrastructures and services coupled with the
continuously evolving threat landscape poses new sophisticated security risks. These risks …